{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:53:45Z","timestamp":1757541225215},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/inm.2011.5990674","type":"proceedings-article","created":{"date-parts":[[2011,8,25]],"date-time":"2011-08-25T11:57:47Z","timestamp":1314273467000},"page":"57-64","source":"Crossref","is-referenced-by-count":2,"title":["Managing data retention policies at scale"],"prefix":"10.1109","author":[{"family":"Jun Li","sequence":"first","affiliation":[]},{"given":"Sharad","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Swaminathan","sequence":"additional","affiliation":[]},{"given":"Alan H.","family":"Karp","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1204750"},{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2004.1309145"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"},{"year":"0","key":"14"},{"journal-title":"Directive 95\/46\/EC of the European Parliament and of the Council","year":"0","key":"11"},{"key":"12","article-title":"Vanish: Increasing data privacy with self-destructing data","author":"geambasu","year":"2009","journal-title":"Usenix Security"},{"journal-title":"Salesforce com Security and Compliance","year":"0","key":"21"},{"year":"0","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/BF02283186"},{"journal-title":"Cloud Architectures","year":"0","author":"varia","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2005.4"},{"key":"3","first-page":"91","article-title":"A revocable backup system","author":"boneh","year":"1996","journal-title":"Proc Usenix Security"},{"journal-title":"Implementing a Trusted Information Sharing Environment Using Immutable Audit Logs to Increase Security Trust and Accountability","year":"2006","author":"baird","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"journal-title":"Amazon com Simple Storage Service","year":"0","key":"1"},{"year":"0","key":"7"},{"key":"6","first-page":"205","article-title":"Bigtable: A distributed storage system for structured data","author":"chang","year":"2006","journal-title":"Proc OSDI"},{"journal-title":"Bycast","year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1147\/rd.524.0379"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"8","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","article-title":"The ponder policy specification language","author":"damianou","year":"2001","journal-title":"Proc IEEE 3rd Int l Workshop on Policies for Distributed Systems and Networks"}],"event":{"name":"2011 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2011)","start":{"date-parts":[[2011,5,23]]},"location":"Dublin, Ireland","end":{"date-parts":[[2011,5,27]]}},"container-title":["12th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5976317\/5990489\/05990674.pdf?arnumber=5990674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T01:10:25Z","timestamp":1497921025000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5990674\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/inm.2011.5990674","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}